Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Foreign Countries | 7 |
Standards | 7 |
Computer Software | 4 |
Classification | 3 |
Comparative Analysis | 3 |
Guidelines | 3 |
Information Security | 3 |
Online Courses | 3 |
Risk | 3 |
Academic Achievement | 2 |
More ▼ |
Source
International Association for… | 2 |
Education and Information… | 1 |
International Educational… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Author
Alshareef, Naser | 1 |
Bernard Ngalim | 1 |
Blažic, Borka Jerman | 1 |
Gupta, Deepty | 1 |
Mavrikis, Manolis, Ed. | 1 |
McLaren, Bruce M., Ed. | 1 |
Pardos, Zachary, Ed. | 1 |
Seng Thah, Soon | 1 |
Stamper, John, Ed. | 1 |
Surbhi | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Collected Works - Proceedings | 2 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 2 |
Secondary Education | 2 |
Elementary Secondary Education | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Cameroon | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
European Union | 1 |
Finland | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Gupta, Deepty; Surbhi – Journal of Educational Technology, 2018
Information and Communication Technology (ICT) has provided the better learning opportunities to the present teachers and learners across the world. In the era of internet, many educational resources are free and lot of free softwares are also available. In our country the basic operating system used in educational institutions are proprietary in…
Descriptors: Open Source Technology, Computer Software, Barriers, Online Courses
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Seng Thah, Soon – International Journal of Computer-Assisted Language Learning and Teaching, 2022
This study was conducted to determine the level of ICT competencies among Malaysian language teachers at both primary and secondary schools. The focus of this study was on four specific domains: 1) technological concepts and operational skills; 2) pedagogical skills; 3) professional skills; and 4) social, ethics, and security skills. These skills…
Descriptors: Language Teachers, Pedagogical Content Knowledge, Second Language Learning, Second Language Instruction
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers